This page contains a Flash digital edition of a book.
9





of Facebook users are the 35 year old plus, all of who will want to access their accounts long into the future. Even if the Facebook site isn’t around a successor will be as social networking appears to be deeply entrenched into so many people’s lives. Smartphone hardware marches on relentlessly. Handsets are certainly getting more powerful, for example in 2010 LG announced the Optimus 2X with a dual core 1GHz processor. Research has shown that 2011 is the year when smartphone shipments will overtake PC shipments, and both PCs and smartphones lay neck and neck at around 400 million units each, per year . The amazing growth in these fantastically powerful devices presents us as security experts with a significant challenge. On top of all their other concerns most Chief Information Security Officers (CISO) are now having to worry about a number of smartphone security issues; • Are my smartphones going to be infected with malware?


• Is my smartphone based data secure? • Will my mobile voice traffic be secure? • Can my smartphones be remotely managed?


There is no longer a discussion about whether these devices should be allowed, now the conversation is how they can be accommodated safely and securely. Ultimately the CISO is worried about risk to the


But what are the particular security issues and opportunities that these smartphones present?


” Bug in Your Bed


business, and in particular how this new smartphone risk can be managed whilst at the same time the business productivity of users improved. Cast one’s mind forward 20 years and it boggles at the depth and breadth of attacks our mobile phones will be subject to. In the meantime anyone that conducts sensitive business using a mobile phone should seriously consider implementing preventative measures sooner rather than later. As more and more people use their mobile phones to run their entire lives, hackers and others will focus their efforts on getting the information they need from these devices. In many respects attitudes towards mobile phone data security reflect those held 20 years ago towards the humble personal computer. Back then attacks were minimal, anti-malware was yet to become established and hacking was in its infancy. Now we are in a maelstrom of attacks against the PC using sophistication and scale we previously thought impossible.


The smartphone is next on the list. Nigel Stanley


Practice Leader - Security Bloor Research


Nigel will chair the Keynote session: Can You Turn Mobile Devices To Your Advantage Or Are They The Next Big Security Hole on Tuesday 19th April at 12.30


Copyright: Gusmolina


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43